Universiti Teknologi MARA. Vulnerability Analysis on the Nenvork Security by Using Nessus
|
|
- Percival Osborne
- 8 years ago
- Views:
Transcription
1
2
3 Universiti Teknologi MARA Vulnerability Analysis on the Nenvork Security by Using Nessus Firkhan Ali b. Hamid Ali l\1scit September 2004
4 U niversiti Teknologi MARA Vulnerability Analysis on the Network Security by Using N essus Firkhan Ali b. Hamid Ali (Bachelor of Computer Science (Hons) UPI\1) Independent study repoli is submitted in partial fulfillment of the requirements for the degree of Master of Science in Information Technology Faculty of Information Technology and Quantitative Sciences September 2004
5 ACKNOWLEDGEMENTS The great of praise is to Allah S.W.T for giving me the opportunity, time and eff0l1 to complete in this independent study repoli. Then, I really hope that it will contribute to the continuously knowledge in the f~uture. I want to express my deep appreciation to my supervisor, En. Abdul Hamid Othman that had gave me a good supervision, valuable of guidance and supp0l1 to complete this study. I am deeply indebted to En. Miswan Surip for his outstanding contribution that gives me pennission to done this study at FTMM, KUiTTHO and including all the staffs of FTMM, KUiTTHO for their co-operation. I am really appreciate the role that all lecturers of the Masters program especially A.P Dr. Isa Samat for their effoli, dedication and support in sharing the knowledge and experiences in the field ofit. lowe a great debt of gratitude to my mum, Rahmah Talib for her prays, advices and suppoli along the way in my life. Thanks a lot to my father in law, Monhadi and mother in law, Kasini for supporting me along this study. Lastly, I want to express my deep appreciation for the supp0l1, understanding and encouragement of my beloved wife, Norsalina Monhadi and two of our cute kids, Fatihah Insyirah and Muhammad AI-Fatih. Thanks a lot to all the contributors. 11
6 TABLE OF CONTENTS CONTENTS PAGE TITLE PAGE ACKNOWLEDGEMENTS TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS ABSTRACT 11 lll-vi VII Vlll IX X CHAPTER 1 PROJECT BACKGROUND 1.1 Introduction Significances of Study Aims Objectives Scopes of Work Project Approach and Methodology Work Flow Project Plan Limitation Summary 2..,.) CHAPTER 2 LITERATURE REVIEW 2.1 Introduction 2.2 Network Management Functional Areas in Network Management III
7 2.2.2 The Network Management Services Area Network Security Network Security Attacks Network Security Service Network Security Model Networking in Linux Layered Network Models TCP/IP Networking Network Protocol TCP/IP Protocols Network Security Assessment Penetration Testing Security Audits Vulnerability Assessment Intrusion in Network Security Discovery Enumeration Vulnerability Mapping Exploitation Vulnerability Scanning Tools Nessus CHAPTER 3 PROJECT APPROACH AND METHODOLOGY 3.1 Introduction.:l._ " ') Background.:l ".:l " Methodology Discovery Vulnerability Scanning IV
8 Vulnerability Analysis Summary CHAPTER 4 RESULTS AND ANALYSIS Introduction Background Results Analysis Type of Vulnerability by Nessus Types of Possible Attacker Types of Possible Security Compromises Exposed of System Component The Best of Network Security Practices Summary CHAPTER 5 CONCLUSION AND RECOMMENDATIONS 5.1 Introduction 5.2 Recommendation 5.3 Conclusion BIBLIOGRAFI APPENDICES Appendix A - List of Available Hosts Appendix B - Network Topology of FTMM Appendix C - Vulnerability Scanning Process by Nessus v
9 Appendix D - General Vulnerability Rep0l1 That Generate by Nessus Appendix E - Vulnerability Report on the One of the Selected Host Appendix F - List of Ness us Plug-ins Family Appendix G - List of Existing 47 Types of Vulnerability VI
10 LIST OF TABLES Table 1.1: Working Schedule Table 2.1: The Layers of OSI Network Model Figure 2.2: The Layers of TCP/IP Network Model Figure 2.3: The Protocols/Network Components in TCP/IP Table 2.4: MTUs "s. Network Layer Table 2.5: Network Protocol in TCP/IP Layer 5 Table 2.6: Network Protocol in TCP/IP Layer 2-4 Table 4.1 : Types of Possible Attacker Table 4.2: Types of Security Compromises Table 4.3: Types of Component that Located Vulnerability ", -' " 0_"'1 84 \.1\
11 LIST OF FIGURES Figure 1.1: Project's woddlow Figure 2.1: Functional Areas of Network Management Figure 2.2: Types of Flow in Netwo, k Attacks Figure 2.3: Network Security Model Figure 3.1: Steps in Vulnerability Analysis hy Nessus Figure 4.1: Available Selected Hosts Figure 4.2: Level of Security Risks Figure 4.3: The Most Dangerous Sen'ices on the Network Figure 4.4: The Most Present Se, vices on the Network Figure 4.5: The Most Dangerous Host Figure 4.6: Number of Security Holes by Hosts Figure 4.7: Level of Security Risks on Host OO.OO.e2.7S.2.. Ue Figure 4.8: List of Open Ports inside the Host Figure 4.9: Detail on One of the Vulnerability inside the Host Figure 4.10: Detail on One of the Warning inside the Host Figure 4.11: Detail on One of the Information inside the I-lost I~ 19 ~-I 66 7~ () ~() \'lj J
12 A TM CSU/DSU DoS HTML HV AC IMAP ISDN ISO UDP OSI NOC NOS PDU PBX RFC RPC SATAN SNMP PC UPS Asynchronous Transfer mode Channel Service Unit/Data Service Unit Denial of Service Hypertext Markup Language Heating, Ventilation and Air Conditioning Internet Message Access Protocol Integrated Services Digital Network International Organization for Standards User Datagram Protocol Open System Interconnection Network Operating Center Network Operating System Protocol Data Unit Public Branch Exchange Request For Comments Remote Procedure Call Security Administrator Tool for Analyzing Network Simple Network Management Protocol Personal Computer UnintelTuptible power Supply IX
13 ABSTRACT Exploitation by attackers whose have breached the network security of some of the world's most venerable institutions and organization had become increased every year including in Faculty of Infon11ation Technology and Multimedia (FTivIM). Kolej Universiti Teknology Tun Huessein Onn (KUiTTHO). Within this type of attention, network security has gone from the as an extra services to the main services in a relatively short period in FTMM. The main purpose is to mitigate security risk and assure that their FTMM's digital assets are in safe and digital environment is become a better condition to the staffs and students. Vulnerability analysis activities can help to identif~y the weaknesses and vulnerabilities in the computer network system at FTMM to prevent the attacks against it by the hackers or crackers. The idea is, done vulnerability analysis by using vulnerability scanning tools. Nessus to identify and fix these weaknesses or vulnerabilities before the attackers use them against the FTMM computer network system.
14 CHAPTER 1 PROJECT BACKGROUND 1.1 Introduction Today, world have face very dangerous threats of cyber crime in the digital environment from a person to a big company like Yahoo, Amazon and etc. The most important is finding the way that it happens and how to protect and solve it. On January 2004, Malaysian Computer Emergency Response Team or MyCERT had reported inside their web site about 157 websites in Malaysia had been hacking and exploit. This incident involved many organization websites including private sector and government. This is the latest incident that happens in Malaysia in several months ago. According to the MyCERT, the last issue on this incident is happening because of two main reasons. Firstly is level of the network security awareness among web masters or system administrators are very low. Secondly, the knowledge of the 'vvebmasters or system administrators is very low. They didn't make any security's assessment and evaluation to ensure the security on their network and systems are in the best condition. Network Security analysis including vulnerability analysis is a chore that many system and network administrators tend to neglect. In today's IT climate of belt tightening, most of the system administrators have a mandate from the companies or organization to do
15 more with fewer resources. Proactive security measures are often low on management's list of priorities especially in Malaysia's organizations until some attacks had done and breach into one of the servers or network According to the scenano and problem above, this project will make a study in vulnerability analysis on the network security by using open source's vulnerability scanning tools, Nessus at Faculty of Infol111ation Technology and Multimedia (FTMM), Kolej Univesiti Teknologi Tun Hussein Onn (KUiTTHO). This effort can be the best way and impoliant things in addressing to this issue. So, this repoli will provide an analysis of the vulnerabilities that make weaknesses on the computer network system in FTMM by using most popular open source tools, Nessus. The result of this analysis will provide including statistic of the types of vulnerabilities, possible attackers, possible infol111ation or data loss that will make weaknesses on the network and the suggestion of best steps or action should be taken to addressing the vulnerabilities that will find in the FTMM's network. 1.2 Significance of Study FTMM will be able to use the result of this vulnerability analysis study on the network security to improve the network security in FTMM, KUiTTHO. Doing this study in FTMM will enhance awareness to done network security assessment and ability of usage open source network security tools. 2
16 1.3 Aims This paper is aim to highlight the critical issues on the security vulnerabilities that make weaknesses on the computer network system in FTMM, Kolej Universiti Teknologi Tun Hussein Onn (KUiTTHO). 1.4 Objectives 1. To scan the network security vulnerabilities and weaknesses by using open source tools, Nessus. 2. To analysis and identify overall of the network security's vulnerabilities that make weaknesses in the network including the general action should be taken on it. 1.5 Scopes of Work As the time allocated for this study is more or less four months, it is essential to outline the scopes of works so that it will work as promised. This study of vulnerability analysis on the network security in FTMM will highlight with this three main things. Firstly is done the vulnerability scanning on the network at FTMM by using open source tools. Secondly is overcome with the possible exploits and vulnerabilities in the computer network from the result of the scanning. Then, the analysis on the vulnerabilities from the
17 vulnerability scanning result will do. Lastly are the recommendations and suggestions to improve the network security according to analysis of the vulnerabilities. Clearly, this study will be implemented to the selected host in range of IP addresses in cel1ain of subnet computer network system in FTMM. 1.6 Project Approach & Methodology This study will be conducted by the following tasks: - Literature review for a study and gather much infom1ation about the: - a) Network management concepts and methodology. b) Network security concept and methodology. c) Network security assessment concept, methodology and Open Source tools. Vulnerability analysis on the network security at FTMM will be conduct by using vulnerability scanning open source tools, Nessus. The steps that will cover in this analysis are discovery, vulnerability scanning and vulnerability analysis. 4
18 1.61 Work Flow START Vulnerability Scanning Vulnerability ~b.na1ysi s Suggesti ons and Recommendati ons "I}lri ting and Submi ssi on Figure 1.1: p,"ojcct's workflow 5
19 1. 7 Project Plan Table 1.1: "'or'king Schedule Yeari:,lonth I 200.+,, i ~by I June I July I August I Sept IOkt I I Planning and Proposal ~! I! I I I I Literature Search ~ i I I I I I Critical Re\'ie\\' ~:,, I I Testing :\et\\'nrk Security I ~ I I I I.\nalysis Data I ~ I I I, Recom mendat i on and : I I Suggestil)n I I I I \\'riting Dissertation I I I ~ I I I> 1.S Limitation The Yast limitation in doing this project IS 111 term of its time. So. to cope with time limitation. this stud\" \\"otiid only done niinerability analysis for network security en\'ironment to the selected host in range of I P addresses in certain subnet computer net\\ork system in FT\I:',1. 6
20 1.9 Summary This is very though time for Malaysian organization including FTMM, KUiTTHO to face too many issues in the nenvork security according to the news and statistic that had provided by MyCERT. All these things will be caused rct facilities will be in damage and slow the process or usable use. This will be effect the quality and quantity of the productions for the organization and the business strategy for that organization is become fail. This network security's problem is critical to many of the organization in Malaysia but analyzing it is a daunting if not impossible task. The solution is make security's assessment including this vulnerability analysis into the network system and the reporting according to the analysis must be consolidates the event data. Then, correlates that data into simplify, meaningful information that is easily understand by the many departments or staffs that need to access it. The intent of this study is to provide useful tips and guidelines from the report of the vulnerability analysis to manage and minimize the vulnerabilities that make penetrations and possible attacks in the computer network system at FTMM, KUiTTHO. The risks or weaknesses from this report like a possible exploit, vulnerabilities or penetration are the potential of the computer network system attacks. In addressing this risks of vulnerabilities, it's need to converge upon a core process for managing network security vulnerabilities by discovering all the network security aspects. 7
21 Then, do scanning these discovered assets over the network system for yulner3bilities. After that, do reporting and prioritizing these vulnerabilities that make the we3knesses on the network. Then, make the suggestions to solve on all these \ ulnerabilities th3t h3d found and its can become dangerous penetrations and attacks to the affected systems. Done the right actions according to the suggestions that we had make from the report to prevent the existing vulnerabilities in the network exploit by the attackers. 8
22 CHAPTER 2 LITERATURE REVIEW 2.1 Introduction Network management is more important things in the network computer system that will provide efficiency and effectiveness use of network. It has several functions including security part that will apply in any type of network topology Network security is become first and very important criteria in any using of devices. system or to make any decision that regarding to the information system. There is because of more systems and computers are interconnected each other for easing to access by authorized users. Then, to detect, protect and react from the threats and intruders. the network security assessment is important thing that need to be done in the organization. So. the testing and analysis in the network security by using network security tools can be done. It has three types of testing and analysis in the network security that includes: - a. Penetration testing. b. Vulnerability Assessment. c. Audit. 9
23 There are many of open source vulnerability scanning tools that available on the Internet that can be use for vulnerability assessment on the network like Nessus, SARA, SATAN and others. Then, to know whose are the attackers and what is methodology, steps and tools that they done on making an attack into the network is also important parts. This knowledge will map the ideas and steps to protect, detect react back if the network system in trouble by intrusions. Lastly, ethical and policy in the network security is more important to the human that involved in network security because it will involve in integrity, availability and confidentiality of data, inforn1ation and system. 2.2 Network Management Main role in the network management concept is keeping up and running to maximum efficiency use of network while effectively managing is growth. There are five functional areas of Network management that consist of Fault/problem management, configuration management, accounting management, perfonnance management and security management. It also known as FCAP that mean for Fault, Configuration, Accounting, Perforn1ance and Security. Then, these five functional areas will apply to 4 distinct, which are Local Area Network, Wide Area Network, ServerlNetwork Operating System and Multi-area. 10
24 2.2.1 Functional Areas in Network Management In the Network management concept to maintain keeping up and running to maximum efficiency while effectively managing is growth is very complex tasks. It has become the very though challenging in the network management processes. So, by dividing its tasks into five functional areas, the tasks of Network management processes can become easier to handle. As mention earlier before the components of this functional areas are consist as follows: - a. Fault/problem management. b. Configuration management c. Accounting management d. PerfOlmance management e. Security management. So, these of five functionalities are needed each other to perform the best computer network running especially in network security and network perfom1ance. The figure 2.1 will show the depending of all these 5 functionality in the network management as follows. 11
VULNERABALITY ASSESSMENT ON THE COMPUTER NETWORK SECURITY
VULNERABALITY ASSESSMENT ON THE COMPUTER NETWORK SECURITY Firkhan Ali B. Hamid Ali, 1 Maziah Bt. Na man@na aman 1 Fakulti Teknologi Maklumat dan Multimedia, Kolej Universiti Teknologi Tun Hussein Onn,
More informationOverview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
More informationInformation Security Organizations trends are becoming increasingly reliant upon information technology in
DATASHEET PENETRATION TESTING SERVICE Sales Inquiries: sales@spentera.com Visit us: http://www.spentera.com Protect Your Business. Get Your Service Quotations Today! Copyright 2011. PT. Spentera. All Rights
More informationPenetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
More informationACKNOWLEDGMENT. I would like to thank Allah for giving me the patience to work hard and overcome all the
ACKNOWLEDGMENT I would like to thank Allah for giving me the patience to work hard and overcome all the research obstacles. My full gratitude is to Dr. Mohammed Al-Jarrah and Dr. Izzat Alsmadi for their
More informationCourse Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
More informationNETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 Twest@timwestconsulting.com OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
More informationREPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
More informationIndustrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
More informationMetasploit The Elixir of Network Security
Metasploit The Elixir of Network Security Harish Chowdhary Software Quality Engineer, Aricent Technologies Shubham Mittal Penetration Testing Engineer, Iviz Security And Your Situation Would Be Main Goal
More informationDETECTING AND ANALYZING NETWORK ATTACKS USING VIRTUAL HONEYNET NUR ATIQAH BT. HASAN 2003470954
DETECTING AND ANALYZING NETWORK ATTACKS USING VIRTUAL HONEYNET By NUR ATIQAH BT. HASAN 2003470954 In partial fulfillment of requirement for the BACHELOR OF SCIENCE (Hons.) IN DATA COMMUNICATION AND NETWORKING
More informationAn Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
More informationCisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
More informationA Study of Technology in Firewall System
2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA), Langkawi, Malaysia A Study of Technology in Firewall System Firkhan Ali Bin Hamid Ali Faculty of Science Computer & Information
More informationETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
More informationSECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
More informationWhy Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
More informationVulnerability Assessment Report Format Data Model
I3E'2005 Vulnerability Assessment Report Format Data Model Dr.D.Polemi G.Valvis Issues Attack paradigm Vulnerability exploit life cycle Vulnerability assessment process Challenges in vulnerability assessment
More informationNetwork System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
More informationPENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com
PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure
More informationITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
More informationPenetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.
1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, juaorteg@uat.edu 1 Juan Ortega, juaorteg@uat.edu 2 Document Properties Title Version V1.0 Author Pen-testers
More informationA Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
More informationHOSTING. Managed Security Solutions. Managed Security. ECSC Solutions
Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT
More informationInformation Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
More informationHacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking
Hacking Book 1: Attack Phases Chapter 1: Introduction to Ethical Hacking Objectives Understand the importance of information security in today s world Understand the elements of security Identify the phases
More informationFor more information email sales@patchadvisor.com or call 703.749.7723
Vulnerability Assessment Methodology Today s networks are typically comprised of a variety of components from many vendors. This adds to the difficulties faced by the system administration staff, as they
More informationDeploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
More informationIntrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
More informationCMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
More informationEC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
More informationEvaluation Report. Office of Inspector General
Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury
More informationWHITE PAPER. An Introduction to Network- Vulnerability Testing
An Introduction to Network- Vulnerability Testing C ONTENTS + Introduction 3 + Penetration-Testing Overview 3 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and
More informationWeb App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
More informationSANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
More informationPRINCIPLES AND PRACTICE OF INFORMATION SECURITY
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY Protecting Computers from Hackers and Lawyers Linda Volonino, Ph.D. Canisius College Stephen R. Robinson Verity Partners, LLC with contributions by Charles
More informationInformation Security Office
Information Security Office SAMPLE Risk Assessment and Compliance Report Restricted Information (RI). Submitted to: SAMPLE CISO CIO CTO Submitted: SAMPLE DATE Prepared by: SAMPLE Appendices attached: Appendix
More informationWEB APPLICATION FIREWALL
WEB APPLICATION FIREWALL BY MOHD IKRAM BIN RAHIMI 2003323326 THESIS PROPOSAL SUBMITTED IN FULFILLMENT OF THE REQUIREMENT FOR BACHELOR OF SCIENCE (Hons.) DATA COMMUNICATION AND NETWORKING FACULTY OF INFORMATION
More informationWHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber
More informationSecurity Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8
Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8 SR140531D 19 August 2014 Miercom www.miercom.com Overview Unify Inc. (formerly Siemens Enterprise Communications)
More informationWHITE PAPER: THREAT INTELLIGENCE RANKING
WHITE PAPER: THREAT INTELLIGENCE RANKING SEPTEMBER 2015 2 HOW WELL DO YOU KNOW YOUR THREAT DATA? HOW THREAT INTELLIGENCE FEED MODELING CAN SAVE MONEY AND PREVENT BREACHES Who are the bad guys? What makes
More informationIBM Managed Security Services Vulnerability Scanning:
IBM Managed Security Services August 2005 IBM Managed Security Services Vulnerability Scanning: Understanding the methodology and risks Jerry Neely Network Security Analyst, IBM Global Services Page 2
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
More informationCisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
More informationINFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
More informationCONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
More informationFootprinting and Reconnaissance Tools
Footprinting and Reconnaissance Tools Topic 1: Common Port Scanning Techniques Do some research on computer ports that are most often scanned by hackers. Identify a port scanning exploit that is interesting
More informationPCI Security Scan Procedures. Version 1.0 December 2004
PCI Security Scan Procedures Version 1.0 December 2004 Disclaimer The Payment Card Industry (PCI) is to be used as a guideline for all entities that store, process, or transmit Visa cardholder data conducting
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
More informationTHE EFFICIENCY AND PROFITABILITY IMPROVEMENT OF THE REHABILITATION OPERATIONS AND MANAGEMENT OF NON PERFORMING LOANS:
THE EFFICIENCY AND PROFITABILITY IMPROVEMENT OF THE REHABILITATION OPERATIONS AND MANAGEMENT OF NON PERFORMING LOANS: A CASE STUDY OF BANK PERUSAHAAN KECIL & SEDERHANA MALAYSIA BERHAD (SME BANK) RIDZA
More informationCourse Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
More informationWeb Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
More informationUF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
More informationFoundstone ERS remediation System
Expediting Incident Response with Foundstone ERS Foundstone Inc. August, 2003 Enterprise Risk Solutions Platform Supports Successful Response and Remediation Introduction The Foundstone Enterprise Risk
More informationNetwork Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
More informationPut into test the security of an environment and qualify its resistance to a certain level of attack.
Penetration Testing: Comprehensively Assessing Risk What is a penetration test? Penetration testing is a time-constrained and authorized attempt to breach the architecture of a system using attacker techniques.
More informationIntegrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
More informationMS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
More informationAIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
More informationOffice of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Improved Security Required for DHS Networks (Redacted) Notice: The Department of Homeland Security, Office of Inspector General, has redacted
More informationVulnerability analysis
Vulnerability analysis License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents License Contents
More informationHow Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
More informationEmbedded Web Server for Infra Red Remote Control
Embedded Web Server for Infra Red Remote Control 1 Nor Azarina Nordin, 2 Siti Zarina Mohd. Muji, 3 Mohd Helmy Abd Wahab, 4 Muhammad Syukri Ahmad 1,2,3 Department of Computer Engineering, Faculty of Electrical
More informationNessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson
Nessus A short review of the Nessus computer network vulnerability analysing tool Authors: Henrik Andersson Johannes Gumbel Martin Andersson Introduction What is a security scanner? A security scanner
More informationUNIVERSITI TEKNOLOGI MARA THE EFFECTIVENESS OF MARKETING MIX STRATEGY CASE STUDY: SETIA ALAM
UNIVERSITI TEKNOLOGI MARA THE EFFECTIVENESS OF MARKETING MIX STRATEGY CASE STUDY: SETIA ALAM HIZMA RAZLIATI BINTI ABDUL RAHIM SEPTEMBER 2011-JANUARI 2012 JABATAN PENGURUSAN HARTANAH FAKULTI SENIBINA PERANCANGAN
More informationNEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
More informationIDS and Penetration Testing Lab ISA656 (Attacker)
IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible
More informationBEFORE THE BREACH: Why Penetration Testing is Critical to Healthcare IT Security
BEFORE THE BREACH: Why Penetration Testing is Critical to Healthcare IT Security August 2014 w w w.r e d s p in.c o m Introduction This paper discusses the relevance and usefulness of security penetration
More informationMedical Device Security Health Group Digital Output
Medical Device Security Health Group Digital Output Security Assessment Report for the Kodak Color Medical Imager 1000 (CMI-1000) Software Version 1.1 Part Number 1G0434 Revision 2.0 June 21, 2005 CMI-1000
More informationSecurity Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions
Security Awareness For Server Administrators State of Illinois Central Management Services Security and Compliance Solutions Purpose and Scope To present a best practice approach to securing your servers
More informationEffective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
More informationApplication Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
More informationHow To Protect A Wireless Lan From A Rogue Access Point
: Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other
More informationPenetration Testing. Presented by
Penetration Testing Presented by Roadmap Introduction to Pen Testing Types of Pen Testing Approach and Methodology Side Effects Demonstration Questions Introduction and Fundamentals Penetration Testing
More informationSecond-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they
More informationTHREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
More informationVirtual Private Networks Solutions for Secure Remote Access. White Paper
Virtual Private Networks Solutions for Secure Remote Access White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information
More informationlocuz.com Professional Services Security Audit Services
locuz.com Professional Services Security Audit Services Today s Security Landscape Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System layer.
More informationPart Banker. Part Geek. All Security & Compliance.
Part Banker. Part Geek. All Security & Compliance. Your IT Security Assessment......begins with Vulnerability Scanning to identify and classify security weaknesses in your IT network. We look for weaknesses
More informationExam 1 - CSIS 3755 Information Assurance
Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information
More informationCyber Essentials. Test Specification
Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8
More informationOn the Deficiencies of Active Network Discovery Systems
On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized
More informationSTATE OF NEW JERSEY IT CIRCULAR
NJ Office of Information Technology P.O. Box 212 www.nj.gov/it/ps/ Chris Christie, Governor 300 River View E. Steven Emanuel, Chief Information Officer Trenton, NJ 08625-0212 STATE OF NEW JERSEY IT CIRCULAR
More informationBellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
More informationADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
More informationExperiences from Educating Practitioners in Vulnerability Analysis
Experiences from Educating Practitioners in Vulnerability Analysis Abstract. This paper presents experiences from a vulnerability analysis course especially developed for practitioners. The described course
More informationN-Dimension Solutions Cyber Security for Utilities
AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential
More informationVulnerability Scanning & Management
Vulnerability Scanning & Management (An approach to managing the risk level of a vulnerability) Ziad Khalil 1, Mohamed Elammari 2 1 Higher Academy, 2 Rogue Wave Software Ottawa, Canada Abstract Vulnerability
More informationWHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
More informationThe purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
More informationCISO's Guide to. Penetration Testing. James. S. Tiller. A Framework to Plan, Manage, and Maximize Benefits. CRC Press. Taylor & Francis Group
CISO's Guide to Penetration Testing A Framework to Plan, Manage, and Maximize Benefits James S. Tiller CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor
More informationNational Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
More informationExecutive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
More informationAnthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown
Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked
More informationNeed for Database Security. Whitepaper
Whitepaper 2 Introduction The common factor in today s global economy where most of the business is done electronically via B2B [Business to Business] or via B2C [business to consumer] or other more traditional
More informationCertified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The
More informationWhite Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
More informationOverview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
More informationThe Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
More informationWeb Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
More information